Skip main navigation

Cookies Notification

We use cookies on this site to enhance your user experience. By continuing to browse the site, you consent to the use of our cookies. Learn More
×

System Upgrade on Tue, May 28th, 2024 at 2am (EDT)

Existing users will be able to log into the site and access content. However, E-commerce and registration of new users may not be available for up to 12 hours.
For online purchase, please visit us again. Contact us at customercare@wspc.com for any enquiries.

SEARCH GUIDE  Download Search Tip PDF File

  Bestsellers

  • articleNo Access

    Integer Codes Correcting Single Errors and Detecting Double Adjacent Errors

  • articleNo Access

    ON EVALUATING BOOLEAN FUNCTIONS WITH UNRELIABLE TESTS

  • articleOpen Access

    TECHNOLOGIES FOR LARGE DATA MANAGEMENT IN SCIENTIFIC COMPUTING

  • articleNo Access

    LONG-RUN RELATIONSHIP BETWEEN IMPORTS AND EXPORTS: EVIDENCE FROM ASIAN COUNTRIES

  • articleNo Access

    INFLOW OF REMITTANCES AND PRIVATE INVESTMENT IN INDIA

  • articleNo Access

    A modified adjoint-based grid adaptation and error correction method for unstructured grid

  • articleNo Access

    Error-Correcting Graph Isomorphism Using Decision Trees

  • articleNo Access

    Integer Codes Correcting Single Errors within Two Bytes

  • articleNo Access

    Fault Tolerance Method for Memory Based on Inner Product Similarity and Experimental Study on Heavy Ion Irradiation

  • articleNo Access

    Real-Time Design and Implementation of Soft Error Mitigation Using Embedded System

  • articleNo Access

    An Improved Rao–Nam Cryptosystem Based on Fractional Order Hyperchaotic System and EDF–QC–LDPC

  • articleNo Access

    Logic Grammars for Diagnosis and Repair

  • articleNo Access

    The Dead-reckoning Navigation Guidance Law Based on Neural Network Collaborative Forecasting

  • articleNo Access

    QUANTUM ERROR CORRECTION FAILS FOR HAMILTONIAN MODELS

  • articleOpen Access

    An Information Theoretic Approach to Originality and Bias in Science

  • articleNo Access

    Thirty Years of Quantum Computing

  • articleNo Access

    CONTROLLED QUANTUM SECURE DIRECT COMMUNICATION WITH QUANTUM ENCRYPTION

  • articleNo Access

    CODING THEORY ON FIBONACCI n-STEP NUMBERS

  • articleNo Access

    A combinatorial approach to quantum error correcting codes

  • articleNo Access

    Linear recurrent cryptography: Golden-like cryptography for higher order linear recurrences